Monthly Archives: July 2014

Piwik pros and cons

Piwik is an open source web analytics system positioned as a free Google Analytics alternative. This OpenX child project is an alternate open source contextual server that can replace Google Ad Manager.

The main difference between Piwik and other analytical systems used by webmasters to collect and analyze information about the sites is that it is placed on your own server instead of using third-party resources (like Google, Bing, etc.). It is entirely at your disposal! More →

FTP, SFTP, FTPS: what is the difference?

Network protocol is a set of rules that allows to connect and exchange the data between several network enabled devices. Nowadays there are many popular network protocols, but this article is devoted to FTP and its safe releases, SFTP and FTPS.

FTP (or File Transfer Protocol) is data transfer protocol that uses a special file server that allows users to exchange text and binary files with any networked computer. After connection is set the user can upload files to the remote machine and download data to his/her local computer.

Created in 1971, FTP is one of the oldest application protocols More →

What is version control system?

Version Control System (or VCS) is a system that monitors and registers changes made in certain files, so that in case of need you can easily go back to their older versions.

As a rule, graphic designers and web developers need to keep every image, layout or code version. Here VCS comes to the aid. It gives you an opportunity to restore particular files, return the entire project to the previous state, look through project/file changes over time, determine who and when made recent changes or some mistakes in the code, and many more. Generally, if using VCS you spoil or lose some files, you can easily restore them. More →

Two-Factor Authentication pros and cons

The fight against hacking is probably the most pressing server security related problem. It is quite difficult to find a golden mean between the user authentication inconvenience and the risk of identification fake. Often one-factor authorization procedure is too vulnerable. It is usually not enough to protect your machine against cracking. It is obvious that the authorization procedure that consists of two or more factors provides higher safety level.

Two-factor authorization (or 2FA) is a login process that combines two criteria of different types. It is accepted to distinguish following factors (or login criteria types): More →